Results for 'government secrecy'

1000+ found
Order:
  1.  68
    Government Secrecy, the Ethics of Wikileaks, and the Fifth Estate.Edward H. Spence - 2012 - International Review of Information Ethics 17:07.
    This paper aims to systematically explore and provide answers to the following key questions: When is government secrecy justified? In a conflict between government secrecy and the public's right to be informed on matters of public interest, which ought to take priority? Is Julian Assange a journalist and what justifies his role as a journalist? Even if Julian Assange is a journalist of the new media, was he justified in disseminating classified information to the public? Who (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  17
    Civil Disobedience in Global Perspective: Decency and Dissent Over Borders, Inequities, and Government Secrecy.Michael Allen - 2017 - Dordrecht: Springer Verlag.
    This book explores a hitherto unexamined possibility of justifiable disobedience opened up by John Rawls’ Law of Peoples. This is the possibility of disobedience justified by appeal to standards of decency that are shared by peoples who do not otherwise share commitments to the same principles of justice, and whose societies are organized according to very different basic social institutions. Justified by appeal to shared decency standards, disobedience by diverse state and non-state actors indeed challenge injustices in the international system (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  23
    Corporate secrecy: the final barrier to corporate governance.Robert Chambers - 2006 - International Journal of Business Governance and Ethics 2 (1):43-53.
  4.  46
    Secrecy in science: Exploring university, industry, and government relationships.Amy C. Crumpton - 1999 - Science and Engineering Ethics 5 (3):417-426.
  5. Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6. Secrecy in consequentialism: A defence of esoteric morality.Katarzyna de Lazari-Radek & Peter Singer - 2010 - Ratio 23 (1):34-58.
    Sidgwick's defence of esoteric morality has been heavily criticized, for example in Bernard Williams's condemnation of it as 'Government House utilitarianism.' It is also at odds with the idea of morality defended by Kant, Rawls, Bernard Gert, Brad Hooker, and T.M. Scanlon. Yet it does seem to be an implication of consequentialism that it is sometimes right to do in secret what it would not be right to do openly, or to advocate publicly. We defend Sidgwick on this issue, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  7. Secrecy in three acts.Peter Galison - 2010 - Social Research: An International Quarterly 77 (3):941-974.
    In June 1979, Congress passed the Espionage Act, the first act of the three secrecy-defining statutes that have shaped so much of the last hundred years of modern American secrecy doctrine. Together with two other statutes that followed in later decades-the Atomic Energy Acts of 1946 and 1954, and the Patriot Act of 2001-these three Acts picked out inflection points in the great ratcheting process that has expanded secrecy from the protection of troop positions and recruitment stations (...)
     
    Export citation  
     
    Bookmark   4 citations  
  8. National Security Secrecy: How the Limits Change.Steven Aftergood - 2010 - Social Research: An International Quarterly 77 (3):839-852.
    As a nation, we seem to be of two minds about secrecy. We know that government secrecy is incompatible with democratic decision-making in obvious ways. Yet there is a near-universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities. Reconciling these conflicting interests is an ongoing challenge. In recent years, a large and growing number of public interest organizations and professional societies have turned their attention to government (...), identifying it as an obstacle to achieving their own objectives. These professionally and politically diverse groups are united by the perception that secrecy has escalated to the point of dysfunction. On that point, there is not much disagreement. One basic premise of the critics of government secrecy is that too much information gets classified and withheld from the public in the name of national security, and that this has undesirable effects on public policy and on public discourse. But a second basic premise is that it is possible to do something about that. These organizations, including my own, do not simply want to protest against improper secrecy but to correct it. And to a remarkable extent, the secrecy system lends itself to such corrective efforts through various mechanisms that will be described below. (shrink)
     
    Export citation  
     
    Bookmark  
  9. Secrecy in Three Acts.Peter Galison - 2010 - Social Research: An International Quarterly 77 (2):941-974.
    In June 1979, Congress passed the Espionage Act, the first act of the three secrecy-defining statutes that have shaped so much of the last hundred years of modern American secrecy doctrine. Together with two other statutes that followed in later decades-the Atomic Energy Acts of 1946 and 1954, and the Patriot Act of 2001-these three Acts picked out inflection points in the great ratcheting process that has expanded secrecy from the protection of troop positions and recruitment stations (...)
    No categories
     
    Export citation  
     
    Bookmark   2 citations  
  10. The Inverse Relationship between Secrecy and Privacy.Julie E. Cohen - 2010 - Social Research: An International Quarterly 77 (3):883-898.
    In civil libertarian discourse, the inverse relationship between government secrecy and privacy is well recognized and widely acknowledged - so widely, in fact, that it can come to seem as though we might regain sufficient privacy simply by cabining official secrecy. But regimes of secrecy that insulate private-sector data processing practices also contribute materially to the decline of privacy, and indeed play a vital role in facilitating government efforts to make citizens' lives transparent. In addition, (...)
     
    Export citation  
     
    Bookmark  
  11.  14
    Secrecy or Silence with Her Finger on Her Mouth”: Jeremy Bentham’s Other Model of Visibility and Power.Kristen R. Collins - 2022 - Political Theory 50 (4):596-620.
    To challenge the Foucauldian legacy of Jeremy Bentham’s panopticon prison, scholars often highlight Bentham’s later writings on the democratic power of public opinion. In doing so, they reaffirm Bentham’s reputation as a unreserved proponent of transparency. To recover the limits of Bentham’s embrace of publicity, I examine the model of visibility exemplified by his designs for the Sotimion, a residence for unmarried, pregnant women. The Sotimion draws our attention to Bentham’s appreciation for concealment as a method of preventing individual and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Nuclear waste, secrecy and the mass media.Len Ackland, Karen Dorn Steele & JoAnn M. Valenti - 1998 - Science and Engineering Ethics 4 (2):181-190.
    Invited media scholars and journalists examine the general issue of nuclear waste, risk and the sicentific promises that were made, but not kept, about safe disposal. The mass media uncovered and reported on nuclear waste problems at Rocky Flats in Colorado and Hanford in Washington. Two environmental journalists review efforts to expose problems at these sites, how secrecy hampered reporting, and the effects of media coverage on nearby residents. An environmental communications scholar evaluates media coverage, the role of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13.  7
    Secrecy and Autonomy in Lewis Carroll.Susan Sherer - 1996 - Philosophy and Literature 20 (1):1-19.
    In lieu of an abstract, here is a brief excerpt of the content:Secrecy and Autonomy in Lewis CarrollSusan ShererVictorian novels quiver with morbid secrets and threatening discoveries. Unseen rooms, concealed doors, hidden boxes, masked faces, buried letters, all appear (and disappear) with striking regularity in the fiction of Victorian England. So many of these secret spaces contain children, and especially little girls, little girls in hidden spaces. The young Jane Eyre sits behind a curtain in the hidden window seat, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  40
    Logics of Political Secrecy.Eva Horn - 2011 - Theory, Culture and Society 28 (7-8):103-122.
    In the modern age, the political secret has acquired a bad reputation. With modern democracy’s ideal of transparency, political secrecy is identified with political crime or corruption. The article argues that this repression of secrecy in modern democracies falls short of a substantial understanding of the structure and workings of political secrecy. By outlining a genealogy of political secrecy, it elucidates the logic as well as the blind spots of a current culture of secrecy. It (...)
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  15.  31
    Secrecy and Autonomy in Lewis Carroll.Susan Sherer - 1996 - Philosophy and Literature 20 (1):1-19.
    In lieu of an abstract, here is a brief excerpt of the content:Secrecy and Autonomy in Lewis CarrollSusan ShererVictorian novels quiver with morbid secrets and threatening discoveries. Unseen rooms, concealed doors, hidden boxes, masked faces, buried letters, all appear (and disappear) with striking regularity in the fiction of Victorian England. So many of these secret spaces contain children, and especially little girls, little girls in hidden spaces. The young Jane Eyre sits behind a curtain in the hidden window seat, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  11
    The Economic Inefficiency of Secrecy: Pension Fund Investors’ Corporate Transparency Concerns.Tessa Hebb - 2006 - Journal of Business Ethics 63 (4):385-405.
    In the wake of recent corporate scandals, this paper traces the growing power of pension funds to provide managerial oversight of the firms they hold in their investment portfolios. Increasingly pension funds are exercising their legitimate rights as owners to raise the corporate governance standards of the firms they invest in. Within corporate governance generally, pension funds are shifting their attention away from managerial accountability and toward measures that increase transparency in firm-level decision-making. Pension funds use transparency to ensure that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  17.  11
    States of secrecy: an introduction.Koen Vermeir & Dániel Margócsy - 2012 - British Journal for the History of Science 45 (2):153-164.
    This introductory article provides an overview of the historiography of scientific secrecy from J.D. Bernal and Robert Merton to this day. It reviews how historians and sociologists of science have explored the role of secrets in commercial and government-sponsored scientific research through the ages. Whether focusing on the medieval, early modern or modern periods, much of this historiography has conceptualized scientific secrets as valuable intellectual property that helps entrepreneurs and autocratic governments gain economic or military advantage over competitors. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  77
    Corporate Governance and the Responsibility of the Board of Directors for Strategic Financial Reporting.James C. Gaa - 2009 - Journal of Business Ethics 90 (S2):179 - 197.
    One of the fundamental principles of good corporate governance is transparency, i.e., the disclosure of private information to external stakeholders, so that they may make judgments and decisions relating to the corporation. Equally important, but less discussed, is the competing value that corporations need to protect legitimate secrets. Corporations thus need a communication strategy for dealing with external stakeholders which addresses the conflict between disclosure and secrecy. This article focuses on an important element of that communication strategy in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19.  62
    The economic inefficiency of secrecy: Pension fund investors' corporate transparency concerns. [REVIEW]Tessa Hebb - 2006 - Journal of Business Ethics 63 (4):385 - 405.
    In the wake of recent corporate scandals, this paper traces the growing power of pension funds to provide managerial oversight of the firms they hold in their investment portfolios. Increasingly pension funds are exercising their legitimate rights as owners to raise the corporate governance standards of the firms they invest in. Within corporate governance generally, pension funds are shifting their attention away from managerial accountability and toward measures that increase transparency in firm-level decision-making. Pension funds use transparency to ensure that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  20. Logically Private Laws: Legislative Secrecy in "The War on Terror".Duncan Macintosh - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press. pp. 225-251.
    Wittgenstein taught us that there could not be a logically private language— a language on the proper speaking of which it was logically impossible for there to be more than one expert. For then there would be no difference between this person thinking she was using the language correctly and her actually using it correctly. The distinction requires the logical possibility of someone other than her being expert enough to criticize or corroborate her usage, someone able to constitute or hold (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  95
    Nsa Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden.George R. Lucas - 2014 - Ethics and International Affairs 28 (1):29-38.
    Whatever else one might say concerning the legality, morality, and prudence of his actions, Edward Snowden, the former U.S. National Security Agency contractor, is right about the notion of publicity and informed consent, which together constitute the hallmark of democratic public policy. In order to be morally justifiable, any strategy or policy involving the body politic must be one to which it would voluntarily assent when fully informed about it. This, in essence, was Snowden's argument for leaking, in June 2013, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  40
    Markets in votes: Alienability, strict secrecy, and political clientelism.Nicolás Maloberti - 2019 - Politics, Philosophy and Economics 18 (2):193-215.
    Standard rationales for the illegality of markets in votes are based on concerns over the undue influence of wealth and the erosion of civic responsibility that would result from the commodification of votes. I present an alternative rationale based on how the mere alienability of votes alters the strategic setting faced by political actors. The inalienability of votes ensure the strict secrecy of voting, that is, the inability of voters to communicate credibly to others the content of their votes. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  30
    Fallout from Government-Sponsored Radiation Research.Carol Mason Spicer - 1994 - Kennedy Institute of Ethics Journal 4 (2):147-154.
    In lieu of an abstract, here is a brief excerpt of the content:Fallout from Government-Sponsored Radiation ResearchCarol Mason Spicer (bio)On December 28, 1993, Energy Secretary Hazel R. O'Leary publicly appealed to both the executive and legislative branches of the United States Government to consider compensation for individuals who were harmed by their exposure to ionizing radiation while enrolled in government-sponsored studies conducted between 1940 and the early 1970s.1 The call for compensation was issued three weeks after Secretary (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  24.  31
    The concept of governance in dual-use research.Alex Dubov - 2014 - Medicine, Health Care and Philosophy 17 (3):447-457.
    The rapid advance of life science within the context of increased international concern over the potential misuse of findings has resulted in the lack of agreement on the issues of responsibility, control and collaboration. This progress of knowledge outpaces the efforts of creating moral and legal guidelines for the detection and minimization of the risks in the research process. There is a need to identify and address normative aspects of dual-use research. This paper focuses on the issues of safety and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Rakesh K Tandon** Head, Gastroenterology and Medical Director, Pushpawati Singhania Research Institute for Liver, Renal and Digestive Diseases, New Delhi.Governing Body & Japi Order - forthcoming - Emergence: Complexity and Organization.
     
    Export citation  
     
    Bookmark  
  26. Development and validation of the situational self-awareness scale.John M. Govern & Lisa A. Marsch - 2001 - Consciousness and Cognition 10 (3):366-378.
    This article discusses the manipulation and measurement of levels of situational self-focus, which is generally labeled ''self-awareness.'' A new scale was developed to quantify levels of public and private self-awareness. Five studies were conducted to assess the psychometric properties, reliability, and validity of the Situational Self-Awareness Scale (SSAS). The SSAS was found to have a reliable factor structure, to detect differences in public and private self-awareness produced by laboratory manipulations, and to be sensitive to changes in self-awareness within individuals over (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  27. Baogang he'.Global Governance - 2003 - Japanese Journal of Political Science 4 (1-2):293-314.
     
    Export citation  
     
    Bookmark  
  28. D66 en vermeuWJDg van de democratie.Urban Governance - forthcoming - Idee.
    No categories
     
    Export citation  
     
    Bookmark  
  29. Regulating animal experimentation.Regulations Governing - 2003 - In Susan Jean Armstrong & Richard George Botzler (eds.), The animal ethics reader. New York: Routledge. pp. 334.
     
    Export citation  
     
    Bookmark  
  30. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Part II. A walk around the emerging new world. Russia in an emerging world / excerpt: from "Russia and the solecism of power" by David Holloway ; China in an emerging world.Constraints Excerpt: From "China'S. Demographic Prospects Toopportunities, Excerpt: From "China'S. Rise in Artificial Intelligence: Ingredientsand Economic Implications" by Kai-Fu Lee, Matt Sheehan, Latin America in an Emerging Worldsidebar: Governance Lessons From the Emerging New World: India, Excerpt: From "Latin America: Opportunities, Challenges for the Governance of A. Fragile Continent" by Ernesto Silva, Excerpt: From "Digital Transformation in Central America: Marginalization or Empowerment?" by Richard Aitkenhead, Benjamin Sywulka, the Middle East in an Emerging World Excerpt: From "the Islamic Republic of Iran in an Age of Global Transitions: Challenges for A. Theocratic Iran" by Abbas Milani, Roya Pakzad, Europe in an Emerging World Sidebar: Governance Lessons From the Emerging New World: Japan, Excerpt: From "Europe in the Global Race for Technological Leadership" by Jens Suedekum & Africa in an Emerging World Sidebar: Governance Lessons From the Emerging New Wo Bangladesh - 2020 - In George P. Shultz (ed.), A hinge of history: governance in an emerging new world. Stanford, California: Hoover Institution Press, Stanford University.
     
    Export citation  
     
    Bookmark  
  32. Òsoòda'såadhyåayåi-Saòtippaònåi.R. Ganesan, Ku Tåamåotaraön, India) Jaimini & Government Oriental Manuscripts Library Nadu - 1999 - Råajakåiyapråacyalikhitagranthåalayaòh.
    No categories
     
    Export citation  
     
    Bookmark  
  33.  17
    Changing Perspectives–Changing Paradigms: Demand management strategies and innovative solutions for a sustainable Okanagan water future.Oliver M. Brandes, Lynn Kriwoken, Water Conservation & Watershed Governance - forthcoming - Polis.
  34.  80
    Speaking Truth to Power. A Theory of Whistleblowing.Daniele Santoro & Manohar Kumar - 2018 - Cham: Springer. Edited by Manohar Kumar.
    Whistleblowing is the public disclosure of information with the purpose of revealing wrongdoings and abuses of power that harm the public interest. This book presents a comprehensive theory of whistleblowing: it defines the concept, reconstructs its origins, discusses it within the current ethical debate, and elaborates a justification of unauthorized disclosures. Its normative proposal is based on three criteria of permissibility: the communicative constraints, the intent, and the public interest conditions. The book distinguishes between two forms of whistleblowing, civic and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35. A Political Philosophy of Ihsan.M. A. Muqtedar, Khan Islam & Good Governance - unknown
     
    Export citation  
     
    Bookmark  
  36. Mill and the secret ballot: Beyond coercion and corruption.Annabelle Lever - 2007 - Utilitas 19 (3):354-378.
    In Considerations on Representative Government, John Stuart Mill concedes that secrecy in voting is often justified but, nonetheless, maintains that it should be the exception rather than the rule. This paper critically examines Mill’s arguments. It shows that Mill’s idea of voting depends on a sharp public/private distinction which is difficult to square with democratic ideas about the different powers and responsibilities of voters and their representatives, or with legitimate differences of belief and interest amongst voters themselves. Hence, (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  37.  53
    Brother secret, sister silence: Sibling conspiracies against managerial integrity. [REVIEW]William De Maria - 2006 - Journal of Business Ethics 65 (3):219-234.
    I offer a new cartography of ethical resistance. I argue that there is an uncharted interaction between managerial secrecy and organizational silence, which may exponentially increase the incidence of corruption in ways not yet understood. Current methods used to raise levels of moral conduct in business and government practice appear blind to this powerful duo. Extensive literature reviews of secrecy and silence scholarships form the background for an early stage conceptual layout of the co-production of secrecy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  38.  17
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market intermediaries (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  12
    Disclosure Conflicts: Crude Oil Trains, Fracking Chemicals, and the Politics of Transparency.Guy Schaffer & Abby Kinchy - 2018 - Science, Technology, and Human Values 43 (6):1011-1038.
    Many governments and corporations have embraced information disclosure as an alternative to conventional environmental and public health regulation. Public policy research on transparency has examined the effects of particular disclosure policies, but there is limited research on how the construction of disclosure policies relates to social movements, or how transparency and ignorance are related. As a first step toward filling this theoretical gap, this study seeks to conceptualize disclosure conflicts, the social processes through which secrecy is challenged, defended, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  13
    The Abdication of Philosophy.Volker Gerhardt - 1996 - Idealistic Studies 26 (2):175-188.
    The basis for the secrecy is equally apparent, being furnished by Kant a bit later: it could, he suggests, damage the repute of governments to take counsel in foreign affairs from their “subjects.” As a consequence, what can only be publicly executed ought to be agreed on previously in strict secrecy. The state may thus only “tacitly... summon its citizens” to “publicly discuss the general maxims of warfare and peacemaking”. Quite superfluously, a few lines later Kant expressly concedes (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41.  6
    The Law and Ethics of Data Sharing in Health Sciences.Marcelo Corrales Compagnucci, Timo Minssen, Mark Fenwick, Mateo Aboy & Kathleen Liddell (eds.) - 2024 - Springer Nature Singapore.
    Data sharing – broadly defined as the exchange of health-related data among multiple controllers and processors – has gained increased relevance in the health sciences over recent years as the need and demand for collaboration has increased. This includes data obtained through healthcare provisions, clinical trials, observational studies, public health surveillance programs, and other data collection methods. The practice of data sharing presents several notable challenges, however. Compliance with a complex and dynamic regulatory framework is essential, with the General Data (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  23
    The “black box” at work.Ifeoma Ajunwa - 2020 - Big Data and Society 7 (2).
    An oversized reliance on big data-driven algorithmic decision-making systems, coupled with a lack of critical inquiry regarding such systems, combine to create the paradoxical “black box” at work. The “black box” simultaneously demands a higher level of transparency from the worker in regard to data collection, while shrouding the decision-making in secrecy, making employer decisions even more opaque to the worker. To access employment, the worker is commanded to divulge highly personal information, and when hired, must submit further still (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  17
    Examining embedded apparatuses of AI in Facebook and TikTok.Justin Grandinetti - forthcoming - AI and Society:1-14.
    In popular discussions, the nuances of AI are often abridged as “the algorithm”, as the specific arrangements of machine learning, deep learning and automated decision-making on social media platforms are typically shrouded in proprietary secrecy punctuated by press releases and transparency initiatives. What is clear, however, is that AI embedded on social media functions to recommend content, personalize ads, aggregate news stories, and moderate problematic material. It is also increasingly apparent that individuals are concerned with the uses, implications, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Making Drones to Kill Civilians: Is it Ethical?Edmund F. Byrne - 2018 - Journal of Business Ethics 147 (1):81-93.
    A drone industry has emerged in the US, initially funded almost exclusively for military applications. There are now also other uses both governmental and commercial. Many military drones are still being made, however, especially for surveillance and targeted killings. Regarding the latter, this essay calls into question their legality and morality. It recognizes that the issues are complex and controversial, but less so as to the killing of non-combatant civilians. The government using drones for targeted killings maintains secrecy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Hordes of vigilantes & popular elements defeat Mai, for now.Noam Chomsky - unknown
    This is a follow up to my article on the Multilateral Agreement on Investment (MAI) in the May issue . That went to press a few weeks before the April 27 target date for signing of the MAI by the OECD countries. At the time, it was fairly clear that agreement would not be reached, and it was not—an important event, worth considering carefully. In part the failure resulted from internal disputes—for example, European objections to the U.S. federal system and (...)
     
    Export citation  
     
    Bookmark  
  46.  17
    Draft for Understanding the Historical Background of Changes in the Ideological Language and Communication of Secret Services in 20th Century’s Hungary.Bela Revesz - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):855-898.
    Words can mean different things to different people. This can be problematic, mainly for those working together in a bureaucratic institution, such as the secret service. Shared, certified, explicit and codified definitions offer a counter to subjective, solitary and/or culturally dominant definitions. It’s true that codified secrecy terms for secret services can be seen to involve a number of political, cultural, subcultural “languages”, but if words come from unclassified or declassified files, memorandums and/or records, one needs a deep understanding (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  34
    Speaking Truth to Conspiracy: Partisanship and Trust.Russell Muirhead & Nancy L. Rosenblum - 2016 - Critical Review: A Journal of Politics and Society 28 (1):63-88.
    ABSTRACTWhat we call the “partisan connection”—the bridge parties build between the people and the formal polity—entails sympathizing with citizens’ suspicions and fears. However, loosening the partisan connection and “speaking truth to conspiracy” is sometimes a moral and political imperative when conspiracy charges come from party leaders’ constituents and fellow partisans. We consider epistemological challenges that make it difficult to assess whether conspiracy claims are warranted, and we consider political challenges to assessing the validity of conspiracy claims that are posed by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  48.  8
    The effectiveness of Voluntarily Produced Transparency Reports.Christopher Parsons - 2019 - Business and Society 58 (1):103-131.
    This article analyzes the relative effectiveness and limitations of companies’ voluntarily produced transparency reports in promoting change in firm and government behavior. Such reports are published by telecommunications companies and disclose how often and on what grounds government agencies compel customer data from these companies. These reports expose corporate behaviors while lifting the veil of governmental secrecy surrounding these kinds of compulsions. Fung, Graham, and Weil’s “targeted transparency” model is used to evaluate the extent to which these (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  14
    Radio waves, memories, and the politics of everyday life in socialist Romania: The case of Radio Free Europe.Ruxandra Petrinca - 2019 - Centaurus 61 (3):178-199.
    During the communist era, Radio Free Europe (RFE) was Romania's favorite radio station. This paper analyzes the role of RFE in everyday life in the strictly controlled Romanian communist state by looking at the broadcasts of RFE's Romanian Department, their audience, and their impact. Drawing largely on the RFE archives at the Vera and Donald Blinken Open Society Archives (OSA) and the former secret police files at the National Council for the Study of the Securitate Archives (CNSAS), it investigates how (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  13
    A polícia política na Bulgária socialista – A “máquina de legitimação” do regime, 1944-1989.Elitza L. Bachvarova - 2018 - Dialogos 22 (1):91.
    Este trabalho examina o caráter, o funcionamento e as mudanças do aparelho de segurança do Estado, os "arcana imperii" socialistas, na Bulgária pré-1989. Com base na noção de ‘governança’ de Foucault e de sua formulação do ‘poder’ como sendo construtivo e repressivo ao mesmo tempo, o presente artigo analisa o braço forte do regime visto como instituição de gestão do conhecimento. A importância da vigilância para a política moderna e a dinâmica do sigilo são discutidas como sendo estruturadas por tecnologias (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000